local wipe

Local wipe, also known as auto-wipe, is deletion of a device's data which is initiated by
software on the device itself, rather than through remote administration.

As a security feature, local wipe may be automatically conducted in response to a number of
failed login attempts or if the device is moved outside of the geographical area in which its use
is approved (see: geofencing). Although the device
wipe can also be remotely initiated, remote wipe relies
upon the user connecting to the corporate server, which is unlikely in the event of a stolen
device.

Related Terms

Definitions

- Private cloud (also called internal cloud) is a marketing term for an enterprise computing architecture that's protected by a firewall. Promotion of the private cloud model is designed to appeal to... (searchCloudComputing.com)

- NVD (National Vulnerability Database) is a product of the National Institute of Standards and Technology (NIST) Computer Security Division and is used by the U.S. Government for security management... (WhatIs.com)

- A remote python call (RPyC) is a type of remote procedure call that allows an administrator to use the universality of Python programming language to manage a remote object as if it were local. (SearchEnterpriseDesktop.com)

- This WhatIs.com glossary contains terms related to Internet applications, including definitions about Software as a Service (SaaS) delivery models and words and phrases about web sites, e-commerce ...

Private cloud (also called internal cloud) is a marketing term for an enterprise computing architecture that's protected by a firewall. Promotion of the private cloud model is designed to appeal to an organization that wants more control over their data than they can get by using a third-party hosted service such as Amazon's Elastic Compute Cloud (EC2) or Simple Storage Service (S3). (Continued)

Definition: Learn what MPLS (Multiprotocol Label Switching) is and why allowing packets to be forwarded at the Layer 2 (switching) level rather than at the Layer 3 (routing) level is important for Quality of Service (QoS).

ZigBee is a mesh network specification for low-power wireless local area networks (WLANs) that cover a large area. The standard was designed to provide high data throughput in applications where the duty cycle is low and low power consumption is an important consideration.

Two-factor authentication is a security process in which the user provides two means of identification, one of which is typically a physical token, such as a card, and the other of which is typically something memorized, such as a security code.

A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines. Independent accounting, security or IT consultants evaluate the strength and thoroughness of compliance preparations. Auditors review security polices, user access controls and risk management procedures over the course of a compliance audit... (Continued)